WO2019076041A1 - Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès - Google Patents

Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès Download PDF

Info

Publication number
WO2019076041A1
WO2019076041A1 PCT/CN2018/086305 CN2018086305W WO2019076041A1 WO 2019076041 A1 WO2019076041 A1 WO 2019076041A1 CN 2018086305 W CN2018086305 W CN 2018086305W WO 2019076041 A1 WO2019076041 A1 WO 2019076041A1
Authority
WO
WIPO (PCT)
Prior art keywords
access device
authentication
access
information
request
Prior art date
Application number
PCT/CN2018/086305
Other languages
English (en)
Chinese (zh)
Inventor
谭细金
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019076041A1 publication Critical patent/WO2019076041A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the present application relates to the field of wireless communications, and in particular, to an access device pairing connection method and an access device.
  • WIFI Wireless Fidelity
  • the user deploys an access device in the room, and the access device provides a WIFI signal, and the user terminal can connect to the network by connecting the access device.
  • the WIFI signal for example, a 25 cc (cm) thick brick wall is attenuated by about 25 db (representing the relative ratio of power), the space is transmitted by 15 m (m), and the attenuation is about 70 db. It can be seen that in a large space, if only a single access device can not completely cover the WIFI signal.
  • multiple access device networking is generally used to achieve full rate coverage of a large space.
  • the networking between the access device and the access device first requires effective authentication between the access devices, that is, pairing is achieved.
  • the identification buttons of the two access devices are generally pressed by the user within a preset time. Complete valid authentication, or enter an identification code on the access device to complete valid authentication.
  • the present invention provides an access device pairing connection method and an access device, which are used to solve the problem that the user operation is cumbersome and efficient under the method in which the access device performs effective authentication in the prior art.
  • the application provides a method for pairing access devices, including:
  • the first access device receives an authentication request that is sent by the second access device after detecting the first access device, where the authentication request includes: identifier information of the second access device, and authentication information;
  • the first access device performs authentication on the second access device according to the authentication information
  • the first access device sends an authentication response to the second access device according to the identifier information of the second access device;
  • the first access device sends an access response to the second access device.
  • the authentication request further includes: a uniqueness verification parameter
  • the method further includes:
  • the first access device verifies the uniqueness of the authentication request according to the uniqueness parameter.
  • the uniqueness verification parameter includes: a random number, and/or a timestamp.
  • the authentication information includes: an agreed content after the preset private key is encrypted;
  • the first access device performs authentication on the second access device according to the authentication information, including:
  • the first access device decrypts the authentication information by using a preset public key, and obtains the decrypted information
  • the first access device determines whether the decrypted information is the same as the agreed content.
  • the agreed content includes: information other than the authentication information in the authentication request.
  • the application provides a method for connecting and connecting an access device, including:
  • the first access device After detecting the second access device, the first access device sends an authentication request to the second access device, where the authentication request includes: identifier information of the first access device, and authentication information;
  • the first access device receives an authentication response that is sent by the second access device according to the identifier information of the first access device, where the authentication response is used to indicate that the second access device is configured according to the Successful authentication of authentication information;
  • the first access device sends a network access request to the second access device
  • the first access device receives an access response sent by the second access device, and completes a network connection according to the access response.
  • the authentication request further includes: a uniqueness verification parameter.
  • the uniqueness verification parameter includes: a random number, and/or a timestamp.
  • the authentication information includes: an agreed content after the preset private key is encrypted.
  • the agreed content includes: information other than the authentication information in the authentication request.
  • the present application provides an access device, the device comprising means or means for performing the methods of the first aspect and the various implementations of the first aspect described above.
  • the present application provides an access device, the device comprising means or means for performing the methods of the second aspect and the various implementations of the second aspect described above.
  • the application provides an access device, the device comprising a processor and a memory, the memory is for storing a program, and the processor calls a program stored in the memory to perform the method provided by the first aspect of the application.
  • the application provides an access device, the device comprising a processor and a memory, the memory is for storing a program, and the processor calls a program stored in the memory to perform the method provided by the second aspect of the application.
  • the application provides an access device comprising at least one processing element (or chip) for performing the method of the above first aspect.
  • the application provides an access device comprising at least one processing element (or chip) for performing the method of the above second aspect.
  • the present application provides a computer storage medium comprising a program for performing the method of the above first aspect.
  • the application provides a computer storage medium comprising a program for performing the method of the above second aspect.
  • the first access device receives an authentication request sent by the second access device after detecting the first access device, where the authentication request includes: The first access device authenticates the second access device according to the authentication information, and the first access device sends the second access device to the second access device after the authentication succeeds. After the authentication succeeds, the first access device sends an authentication response to the second access device after the authentication succeeds. After the authentication is completed, the access device can initiate the access to access the second access device to the network. The entire authentication and access network process is completed by the first access device and the second access device, and no human intervention is required, which improves the access efficiency and user experience, and also improves the security of the networking process.
  • FIG. 1 is a schematic diagram of a communication network architecture
  • FIG. 2 is a schematic flowchart of a method for pairing and connecting access devices according to an embodiment of the present disclosure
  • FIG. 3 is a schematic structural diagram of an authentication request in an access device pairing connection method according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of an authentication request in an access device pairing connection method according to another embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of an authentication request in an access device pairing connection method according to an embodiment of the present disclosure
  • FIG. 6 is a schematic structural diagram of an access device according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of an access device according to another embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an access device according to another embodiment of the present disclosure.
  • FIG. 1 is a schematic diagram of a communication network architecture.
  • the communication network includes a plurality of access devices 01, and the plurality of access devices 01 include a primary access device, and the primary access device can be connected to a network provided by an operator, and other access devices.
  • the access network can be accessed by accessing the primary access device or other access devices that have access to the network, that is, the multiple access devices 01 are networked.
  • the foregoing access device may be referred to as an access point (AP).
  • AP access point
  • Each access device 01 can access one or more terminals 02 to provide a network for the terminal 02.
  • Multiple access devices 01 can be deployed in various locations in a large space, or deployed in various rooms of an office building, various rooms in a family home, etc., to achieve more comprehensive network coverage.
  • the terminal device includes, but is not limited to, a mobile station (MS, Mobile Station), a mobile terminal (Mobile Terminal), a mobile telephone (Mobile Telephone), a mobile phone (handset), and a portable device.
  • the terminal can communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the terminal can be a mobile phone (or “cellular” phone), a computer with wireless communication function, etc., the terminal. It can also be a portable, pocket, handheld, computer built-in or in-vehicle mobile device or device.
  • the networking process requires other access devices to be paired with the primary access device, that is, the validity of the verification.
  • the user needs to input information or press a button to complete, that is, the operation must be performed manually, and the process is cumbersome. And the security is not high.
  • the present application proposes a new access device pairing connection method.
  • the first access device is a primary access device or an access device that has accessed the network through other access devices.
  • the two access devices need to access the network by accessing the first access device.
  • the first access device and the second access device may be the same physical device.
  • the method includes:
  • the first access device receives an authentication request sent by the second access device after detecting the first access device, where the authentication request includes: identifier information of the second access device, and authentication information.
  • the identifier information of the second access device is used to identify the second access device, which may be a media access control (MAC) address of the second access device, a serial number of the second access device, and the like. No restrictions. So that the first access device identifies the second access device and obtains relevant address information for subsequent interaction.
  • MAC media access control
  • the authentication information may be some information pre-approved by the first access device and the second access device, or some information configured before the factory, for the opposite device to verify its validity, and the first access device needs to be After confirming that the second access device is valid and trusted, the subsequent access process will be performed.
  • the first access device may perform authentication on the second access device, or both parties may perform authentication, that is, the second access device also receives the authentication sent by the first access device. Requesting to authenticate the first device, both parties pass the authentication and then enter the subsequent access process.
  • the second access device may detect the signals of other access devices within the coverage of the signal, and after detecting the first access device, automatically send an authentication request without human triggering.
  • the first access device authenticates the second access device according to the foregoing authentication information.
  • the first access device sends an authentication response to the second access device according to the identifier information of the second device.
  • the second access device sends a network access request to the first access device.
  • the first access device sends an access response to the second access device.
  • the first access device sends an access response to the second access device according to the identifier information of the second device.
  • the access process can use the Wi-Fi protected setup (WPS) authentication process to complete the authentication to access.
  • WPS Wi-Fi protected setup
  • the second access device After the second access device completes the access, it can connect to the network to provide network services for the terminals in the coverage.
  • the first access device receives an authentication request sent by the second access device after detecting the first access device, where the authentication request includes: identifier information of the second access device, and authentication information,
  • the first access device authenticates the second access device according to the foregoing authentication information, and the first access device sends an authentication response to the second access device after the authentication succeeds, and the first access device is authenticated.
  • the authentication response is sent to the second access device.
  • the access may be initiated to access the second access device to the network.
  • the entire authentication and access network process is completed by the first access device and the second access device, and no human intervention is required, which improves the access efficiency and user experience, and also improves the security of the networking process.
  • the foregoing authentication request may further include: a uniqueness verification parameter.
  • the above method may further comprise: verifying the uniqueness of the foregoing authentication request according to the uniqueness parameter.
  • the interaction between the first access device and the second access device is a plaintext interaction before the data encryption key is officially obtained, so that the third party can easily forge the first access device and the second access device by using packet capture.
  • Inter-communication packets in order to avoid attacks, can carry unique authentication parameters in the message.
  • the uniqueness verification parameters carried in each authentication request are different. If the first access device receives the same uniqueness verification parameter, the second access device may be denied access, or attack identification may be performed to determine the authentication. Whether the request is attacked.
  • the above-mentioned uniqueness verification parameter may include: a random number, and/or a timestamp.
  • Random numbers and timestamps are different at any time. Embedding random numbers and/or timestamps in authentication requests ensures the uniqueness of each transmission.
  • the authentication information may include: the preset content encrypted by the preset private key.
  • the first access device performs the authentication on the second access device according to the foregoing authentication information, where the first access device decrypts the authentication information by using a preset public key, and obtains the decrypted information. Then, the first access device determines whether the decrypted information is the same as the agreed content.
  • the above public key and private key are a pair of keys, one for encryption and the other for decryption.
  • the private key is used for encryption, and only the corresponding public key can decrypt the content. If the decrypted content is the same as the pre-agreed content, the first access device determines that the second access device is valid and can access. .
  • the content of the agreement includes: information other than the authentication information in the authentication request. That is, in the authentication request, the information statistics other than the authentication information may be encrypted with the private key and carried in the authentication request.
  • the first access device decrypts the authentication information by using the preset public key, the information is compared and decrypted. If the information is consistent with other information, if the authentication is successful, the second access device is determined to be valid and can be accessed. If the authentication is inconsistent, the authentication fails, and the second access device is not allowed to access.
  • FIG. 3 is a schematic structural diagram of an authentication request in an access device pairing connection method according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic structural diagram of an authentication request in an access device pairing connection method according to another embodiment of the present disclosure.
  • the authentication request may include the uniqueness verification parameter and the authentication information.
  • the first access device After receiving the authentication request, the first access device authenticates the authentication information and determines the uniqueness according to the uniqueness verification parameter.
  • the second access device is allowed to access the network when both are met.
  • the authentication request may include: identifier information of the second access device, uniqueness verification parameters, custom text, and authentication information.
  • the custom text is a reserved space and can be expanded in the future. This application is not limited.
  • the authentication information includes the “identity information of the second access device + uniqueness verification parameter + custom text” after the preset private key is encrypted.
  • a hash algorithm may be used to calculate a hash value of "identity information of the second access device + uniqueness verification parameter + custom text", and the authentication information includes "second” encrypted by the preset private key.
  • the hash value of the identification information of the access device + uniqueness verification parameter + custom text may be used to calculate a hash value of "identity information of the second access device + uniqueness verification parameter + custom text.
  • the authentication information may include the “MAC address of the second access device + time stamp + custom text” after the preset private key is encrypted, or the authentication information may include the “second access device” after the preset private key is encrypted.
  • MAC address + time stamp + custom text "hash value this application is not limited.
  • FIG. 5 is a schematic structural diagram of an authentication request in an access device pairing connection method according to an embodiment of the present disclosure.
  • the first access device may also serve as an accessing party.
  • the second access device like the first access device, can be the access party or the requesting access party.
  • the method includes:
  • the first access device After detecting the second access device, the first access device sends an authentication request to the second access device, where the authentication request includes: identifier information of the first access device, and authentication information.
  • the identifier of the first access device may be the MAC address of the first access device, the serial number of the first access device, and the like, which are not limited herein.
  • the first access device may automatically send an authentication request to the second access device, without manual triggering operation.
  • the first access device receives an authentication response that is sent by the second access device according to the identifier information of the first access device.
  • the authentication response is used to indicate that the second access device successfully authenticates according to the authentication information.
  • the first access device sends a network access request to the second access device.
  • the first access device receives an access response sent by the second access device, and completes the network connection according to the access response.
  • the second access device authenticates the first access device
  • the validity of the first access device is confirmed, and the authentication response is sent to the first access device.
  • the two parties can enter the access process.
  • the access process can use the WPS authentication process to complete the authentication to access.
  • This application does not limit the application.
  • the first access device and the second access device securely acquire an account through key exchange and complete network access.
  • the first access device after detecting the second access device, sends an authentication request to the second access device, where the authentication request includes: identifier information of the first access device, and authentication information,
  • the second access device successfully authenticates, the first access device sends an authentication response to the first access device, and then the first access device sends a network access request to the second access device, and receives the connection sent by the second access device.
  • the network connection is completed according to the access response.
  • the entire authentication and access network process is completed by the interaction information between the first access device and the second access device, and no human intervention is required, thereby improving access efficiency and user experience.
  • the authentication request may further include: a uniqueness verification parameter.
  • the uniqueness verification parameter can be a random number, and/or a timestamp.
  • the second access device After receiving the authentication request, the second access device further verifies the uniqueness of the foregoing authentication request according to the uniqueness parameter.
  • the uniqueness verification parameters carried in each authentication request are different. If the second access device receives the same uniqueness verification parameter, the first access device may be denied access, or attack identification may be performed to determine the authentication. Whether the request is attacked.
  • the authentication information includes: an agreed content that is encrypted by the preset private key.
  • the agreement content includes: information other than the authentication information in the authentication request. See Figure 3 and Figure 4.
  • FIG. 6 is a schematic structural diagram of an access device according to an embodiment of the present disclosure. As shown in FIG. 6, the device includes: a receiving module 601, an authentication module 602, and a sending module 603, where:
  • the receiving module 601 is configured to receive an authentication request that is sent by the second access device after detecting the first access device, where the authentication request includes: identifier information of the second access device, and authentication information. .
  • the authentication module 602 is configured to perform authentication on the second access device according to the authentication information.
  • the sending module 603 is configured to send an authentication response to the second access device according to the identifier information of the second access device after the authentication succeeds.
  • the receiving module 601 is further configured to receive a network access request sent by the second access device.
  • the sending module 603 is further configured to send an access response to the second access device.
  • the authentication request further includes: a uniqueness verification parameter.
  • the authentication module 602 is further configured to verify the uniqueness of the authentication request according to the uniqueness parameter.
  • the uniqueness verification parameter includes: a random number, and/or a timestamp.
  • the authentication information includes: an agreed content that is encrypted by a preset private key.
  • the authentication module 602 is specifically configured to decrypt the authentication information by using a preset public key to obtain the decrypted information, and determine whether the decrypted information is identical to the agreed content.
  • the agreed content includes: information other than the authentication information in the authentication request.
  • FIG. 7 is a schematic structural diagram of an access device according to another embodiment of the present disclosure. As shown in FIG. 7, the device includes: a sending module 701 and a receiving module 702, where:
  • the sending module 701 is configured to send an authentication request to the second access device after detecting the second access device, where the authentication request includes: identifier information of the first access device, and authentication information.
  • the receiving module 702 is configured to receive an authentication response that is sent by the second access device according to the identifier information of the first access device, where the authentication response is used to indicate that the second access device is configured according to the authentication information. The authentication was successful.
  • the sending module 701 is further configured to send a network access request to the second access device.
  • the receiving module 702 is further configured to receive an access response sent by the second access device, and complete a network connection according to the access response.
  • the authentication request further includes: a uniqueness verification parameter.
  • the uniqueness verification parameter includes: a random number, and/or a timestamp.
  • the authentication information includes: an agreed content after the preset private key is encrypted.
  • the agreed content includes: information other than the authentication information in the authentication request.
  • each module of the above device is only a division of a logical function, and the actual implementation may be integrated into one physical entity in whole or in part, or may be physically separated.
  • these modules can all be implemented by software in the form of processing component calls; or all of them can be implemented in hardware form; some modules can be realized by processing component calling software, and some modules are realized by hardware.
  • the authentication module may be a separately set processing element, or may be integrated in one of the above-mentioned devices, or may be stored in the memory of the above device in the form of program code, and processed by one of the devices.
  • the component invokes and executes the functions of the above authentication module.
  • the implementation of other modules is similar.
  • all or part of these modules can be integrated or implemented independently.
  • the processing elements described herein can be an integrated circuit that has signal processing capabilities. In the implementation process, each step of the above method or each of the above modules may be completed by an integrated logic circuit of hardware in the processor element or an instruction in a form of software.
  • the above modules may be one or more integrated circuits configured to implement the above methods, such as one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (Digital) Signal Processor, DSP), or one or more Field Programmable Gate Arrays (FPGAs).
  • ASICs Application Specific Integrated Circuits
  • DSP Digital Signal Processor
  • FPGAs Field Programmable Gate Arrays
  • the processing component can be a general purpose processor, such as a central processing unit.
  • CPU Central Processing Unit
  • SOC system-on-a-chip
  • FIG. 8 is a schematic structural diagram of an access device according to another embodiment of the present disclosure. As shown in FIG. 8, the device includes: a memory 10 and a processor 11.
  • the memory 10 can be a separate physical unit and can be connected to the processor 11 via a bus.
  • the memory 10 and the processor 11 can also be integrated together, implemented by hardware or the like.
  • the memory 10 is configured to store a program for implementing the above method embodiments, or the modules of the embodiments shown in FIG. 6 to FIG. 7, and the processor 11 calls the program to perform the operations of the above method embodiments.
  • the access device may also include only the processor.
  • the memory for storing the program is located outside the access device, and the processor is connected to the memory through the circuit/wire for reading and executing the program stored in the memory.
  • the processor may be a Central Processing Unit (CPU), a Network Processor (NP) or a combination of a CPU and an NP.
  • CPU Central Processing Unit
  • NP Network Processor
  • the processor may further include a hardware chip.
  • the hardware chip may be an Application-specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof.
  • the PLD may be a Complex Programmable Logic Device (CPLD), a Field-Programmable Gate Array (FPGA), a Generic Array Logic (GAL), or any combination thereof.
  • the memory may include a volatile memory such as a random access memory (RAM); the memory may also include a non-volatile memory such as a flash memory.
  • RAM random access memory
  • non-volatile memory such as a flash memory.
  • HDD hard disk drive
  • SSD solid state drive
  • the memory may also include a combination of the above types of memories.
  • the embodiment of the present application further provides a computer storage medium, which is stored with a computer program, which is used to perform the access device pairing connection method provided by the foregoing embodiment.
  • the embodiment of the present application further provides a computer program product including instructions, which when executed on a computer, causes the computer to perform the access device pairing connection method provided by the foregoing embodiment.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé de connexion appariée de dispositifs d'accès, ainsi que des dispositifs d'accès. Le procédé comporte les étapes consistant à: recevoir, par un premier dispositif d'accès, une demande d'authentification émise par un second dispositif d'accès après avoir détecté le premier dispositif d'accès, la demande d'authentification comportant des informations d'identifiant du second dispositif d'accès et des informations d'authentification; authentifier le second dispositif d'accès d'après les informations d'authentification; envoyer une réponse d'authentification au second dispositif d'accès après que l'authentification a réussi; recevoir une demande d'accès au réseau émise par le second dispositif d'accès; envoyer une réponse d'accès au second dispositif d'accès. Les modes de réalisation de la présente invention réalisent l'achèvement d'un processus entier d'authentification et d'accès au réseau au moyen d'une interaction d'information entre un premier dispositif d'accès et un second dispositif d'accès, sans faire intervenir de participation humaine, améliorent le rendement d'accès et l'agrément d'utilisation, et améliorent également la sécurité d'un processus de construction de réseau.
PCT/CN2018/086305 2017-10-18 2018-05-10 Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès WO2019076041A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710969501.4A CN109688580A (zh) 2017-10-18 2017-10-18 接入设备配对连接方法及接入设备
CN201710969501.4 2017-10-18

Publications (1)

Publication Number Publication Date
WO2019076041A1 true WO2019076041A1 (fr) 2019-04-25

Family

ID=66174285

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/086305 WO2019076041A1 (fr) 2017-10-18 2018-05-10 Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès

Country Status (2)

Country Link
CN (1) CN109688580A (fr)
WO (1) WO2019076041A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621796A (zh) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 无线分布式系统中接入点自动对接方法与装置
CN101645814A (zh) * 2008-08-04 2010-02-10 上海华为技术有限公司 一种接入点接入移动核心网的方法、设备及系统
CN102685745A (zh) * 2012-04-23 2012-09-19 深圳市江波龙电子有限公司 无线ap设备的认证方法和系统
CN104519517A (zh) * 2013-09-30 2015-04-15 深圳市群云网络有限公司 无线局域网中无线接入点ap自动配置的方法和系统
US20170265081A1 (en) * 2016-03-14 2017-09-14 Fujitsu Limited Wireless communication device, wireless communication method, and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645814A (zh) * 2008-08-04 2010-02-10 上海华为技术有限公司 一种接入点接入移动核心网的方法、设备及系统
CN101621796A (zh) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 无线分布式系统中接入点自动对接方法与装置
CN102685745A (zh) * 2012-04-23 2012-09-19 深圳市江波龙电子有限公司 无线ap设备的认证方法和系统
CN104519517A (zh) * 2013-09-30 2015-04-15 深圳市群云网络有限公司 无线局域网中无线接入点ap自动配置的方法和系统
US20170265081A1 (en) * 2016-03-14 2017-09-14 Fujitsu Limited Wireless communication device, wireless communication method, and computer readable storage medium

Also Published As

Publication number Publication date
CN109688580A (zh) 2019-04-26

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
Shen et al. Secure key establishment for device-to-device communications
US20190156019A1 (en) Secure authentication of devices for internet of things
US8126145B1 (en) Enhanced association for access points
EP3057351B1 (fr) Procédé, système et dispositif d'accès d'un terminal et support de stockage informatique
WO2018137351A1 (fr) Procédé, dispositif et système pertinents de traitement de clé de réseau
CN112514436B (zh) 发起器和响应器之间的安全的、被认证的通信
US20150113277A1 (en) Provisioning Devices For Secure Wireless Local Area Networks
KR20180057665A (ko) 사용자 장비(ue)를 위한 액세스 방법, 디바이스 및 시스템
WO2022111187A1 (fr) Procédé et appareil d'authentification de terminal, dispositif informatique et support de stockage
US11082843B2 (en) Communication method and communications apparatus
US9735970B1 (en) Techniques for secure voice communication
WO2017133021A1 (fr) Procédé de traitement de sécurité et dispositif pertinent
CN112640385B (zh) 用于在si系统中使用的非si设备和si设备以及相应的方法
CN112602290B (zh) 一种身份验证方法、装置和可读存储介质
WO2014127751A1 (fr) Méthode de configuration de terminal sans fil, appareil et terminal sans fil
WO2023283789A1 (fr) Procédé et appareil de communication sécurisée, dispositif terminal et périphérique de réseau
US20190149326A1 (en) Key obtaining method and apparatus
CN107070659B (zh) 基站和头戴式耳机的认证
WO2014201783A1 (fr) Procédé, système et terminal de chiffrement et d'authentification pour un réseau ad hoc
WO2016026429A1 (fr) Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier
WO2020147602A1 (fr) Procédé, appareil et système d'authentification
WO2016176902A1 (fr) Procédé d'authentification de terminal, terminal de gestion et terminal d'application
WO2016003310A1 (fr) Amorçage d'un dispositif à un réseau sans fil
WO2019076041A1 (fr) Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18868242

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18868242

Country of ref document: EP

Kind code of ref document: A1